How to bypass your ISP’s blocks

posted May 21, 2012/

Since many of my friends complained that they weren’t able to access torrent sites, due to the blocks set by their ISPs, I decided to compile a few methods to bypass these blocks. These methods can also be used in schools and workplaces to get around restrictions. Please note, MoZ does not support piracy in any way, but neither do we believe in censorship and limiting people’s freedom. To indulge in piracy is your choice; we just request that you support independant artists and those who need it.

2. Right-click the connection that you want to change, and then click Properties. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.

3. Click the Networking tab. Under This connection uses the following items, click Internet Protocol Version 4 (TCP/IPv4), and then click Properties.

4. Change the option to use the following DNS server: 8.8.8.8 and use 8.8.4.4 as an alternate.

Similarly, other OS users can figure out how to change your DNS IP. Google is your friend. There are also other friends supplying public DNS servers, such as OpenDNS.

Changing the DNS IP should do the trick, but in case it hasn’t, you can always try using a proxy.

Method 2 : Using a proxy

SO what is a proxy?

As Wikipedia says,

In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers.

A proxy can help you access and download material from torrent websites by going through an intermediate server. To use a proxy, simply google ‘free proxy’ and use any one. Or you can use any one of the numerous proxies offered at Proxy.org.

Simply enter the website you wish to access, select a proxy, and voila.

If you want to access The Pirate Bay, the UK Pirate party group has supplied a list of proxies for the site which can be found here. Just click on any of the links to use them. They are mirrors of the site.

Tor works by distributing your transactions over several places on the Internet, so no single point can link you to your destination. The variety of people who use Tor is actually part of what makes it so secure. Tor hides you among the other users on the network, so the more populous and diverse the user base for Tor is, the more your anonymity will be protected. Tor will bypass any block and is by far, the most secure method for accessing sites, but this can also make it quite slow. It isn’t recommended for non-computer-savvy due to it’s complexity. Windows, mac and Linux users can download the browser bundle available on the site.

Method 4 : Set up a Virtual Private Network

A virtual private network (VPN) is a secure network that uses the Internet, to provide remote offices or traveling users an access to a central organizational network. It also helps users gain entry to restricted sites. The only problem with VPNs is that they are mostly a paid service. Some trusted VPN’s are OpenVPN, PrivateInternetAccess and iPredator.

If you know any other methods which I missed, I’d be glad to include them. And do remember, usage of any of these methods is at your discretion.